Risk Assessment of Computer Network Security in Banks

Size: px
Start display at page:

Download "Risk Assessment of Computer Network Security in Banks"

Transcription

1 , pp Risk Assessment of Computer Network Security in Banks Tan Juan Weifang University of Science and Technology, Shandong, Shouguang, Abstract The importance of computer system security of banks can never be exaggerated. Conducting risk assessment of computer system security of banks can increase safety management and ensure normal operation. This paper firstly figures out risk assessment indexes for computer system security of banks through literature review and survey. Secondly, it uses AHP to confirm the weight of indicators and establishes five security levels. According to the judgment of experts, it finally establishes the risk assessment model for computer system security of banks. Keywords: computer; AHP; weight; risk assessment; fuzzy evaluation 1. Introduction Banks are an integral part of state-owned enterprises. With the development of computer network and the expansion of trading channel of banks, online services become more and more open and banks have experienced continuous upgrading. The computer network is placed a priority in banks. However, the computer network is easy to be attacked by viruses and Hackers. A damaged network will cause dire consequences and hit the bank greatly. Therefore, risk assessment of computer system security of banks can detect loop-holes in advance and warn the bank to increase the security level of computer network, ensuring that the bank is operated in a normal state. In response to the facts that the computer network of banks has multiple trading channels, the system is quite open and system data can be concentrated, banks and the government have followed closely network security. This paper intends to assess the computer system security of banks, makes reasonable warning of the security and establishes an appraisal model of computer system security of banks. In recent years, security loopholes loom large. For example, deposit is missing for no reasons and bank credit card becomes invalid. All these worry people a lot. Many banks recruited professionals to assess the computer network security in order to avoid unnecessary losses. Thus, it is important to conduct risk assessment of computer system security of banks, as it can increase the security level of banks, guarantees normal operation maintains bank s reputation and promotes a normal and stable life. Computer system security of banks has been studied many times. There are research results relevant to this topic on National Knowledge Infrastructure and relevant to risk assessment of computer system security of banks. 2. Evaluation Indicator System for Computer System Security of Banks Based on the questionnaires to Rural Commercial Bank, Agricultural Bank of China and China Construction Bank and relevant literature review, and according to the operation of computer network of banks (TCP/IP Internet model is adopted), there are four layers of evaluation indexes for the computer system security of banks, namely the ISSN: IJSIA Copyright c 2016 SERSC

2 physical layer, the network layer, the data layer and the layer. Each layer contains several second level evaluation indexes, as shown in Table 1. Table 1. Risk Assessment System for Computer System Security of Bank P first level evaluation index physical layerp 1 network layerp 2 data layerp 3 second level evaluation index computer hardware P 11 ; computer network facilitiesp 12 ;wiring system P 13 ;bank staff P 14 ; firewall P 21 ; vulnerability detection P 22 ; alarm system P 23 ; safety system P 24 ; certificate validation P 25 ; data detection P 31 ; data transmission P 32 ; data backup P 33 ; identity recognition P 34 ; log auditing P 35 ; layerp 4 response P 41 ; measurep 42 ; recovery P 43 ; 3. Index Weight of Computer System Security of Banks AHP is used to confirm the index weight of computer system security of banks. Firstly, the layer structure of computer system security of banks is established to do the assessment, as shown in Figure.1. Figure 1. Evaluation System Structure for Computer System Security of Banks Secondly, the 1-9 scale is used to construct the comparative judgment of all indexes. The comparative judgment is established by comparing the influence of indexes of the sub-layer on that of the dominant-layer. The influence is confirmed according to experts judgment. 2 Copyright c 2016 SERSC

3 Scale a ij Table Value of Scale Mark Comparison results between index I and index j 1 same influence of index i and index j 3 the influence of index i is a bit stronger than index j 5 the influence of index i is stronger than index j 7 the influence of index i is much stronger than index j 9 the influence of index i is absolutely stronger than index j 2,4,6,8 1 1,, 2 9 The comparative influence of index i and index j lies in between 1,3,5 and 9 The comparative influence of index i and index j is the interval number of a ij Thirdly, use the geometric method to calculate the weight of indexes (1) Compute the product of elements in each line in the comparative judgment and get vector ; (2) (2)Subject vector to extraction and get vector ; (3) Normalize vector and get the corresponding weight vector. Finally, subject the comparative judgment to consistency test with the following two steps. ar n ij j max n 1 j1 CI max (1) Compute the consistency index n 1 n i1 ri, where. CI CR (2) Compute the consistency radio RI, where RI refers to random consistency index. Its value is shown in Table 3. Table 3. Random Consistency Indexes n n RI Neutrally, when 0.10 CR, subject the comparative judgment to consistency test. Use AHP to calculate the index weight of computer system security of banks: Copyright c 2016 SERSC 3

4 Table 4. Comparison Matrix and Test Results of the First Level Evaluation Indexes Relative to the Target Layer Target layer computer system security of banks P maximum consistency first level evaluation index physical network data weight eigenvalue ratio layerp 1 layerp 2 layerp 3 layerp 4 physical layer P 1 1 1/6 1/ network layer P data layer P 3 3 1/ layer P 4 1/5 1/9 1/ Table 5. Comparison Matrix and Test Results of the Second Level Evaluation Indexes Relative to the First Level Evaluation Indexes first level evaluation index physical layerp 1 computer computer wiring bank maximum consistency second level evaluation index hardware network system staff weight eigenvalue ratio P 11 facilitiesp 12 P 13 P 14 computer hardware P /5 1/3 1/ computer network facilitiesp wiring system P /3 1 1/ bank staff P / Table 6. Comparison Matrix and Test Results of the Second Level Evaluation Index Relative to the Network Layer Indexes P2 first level evaluation index network layerp 2 second level evaluation index firewall P 21 alarm vulnerability system detection P 22 P 23 safety maximum certificate system weight eigenvalue validation P 24 firewall P / vulnerability detection P 22 1/5 1 1/3 1/8 1/ alarm system P 23 1/ /7 1/ safety system P certificate validation P 25 1/ / Table 7. Comparison Matrix and Test Results of the Second Level Evaluation Index Relative to the First Level Data Layer Indexes P3 P 25 consistency ratio first level evaluation index data layerp 3 data data data identity log maximum consistency second level evaluation index detection transmission backup recognition auditing weight eigenvalue ratio P 31 P 32 data detection P data transmission P 32 1/ /3 1/ data backup P 33 1/9 1/5 1 1/6 1/ identity recognition P 34 1/ log auditing P 35 1/ / P 33 P 34 P Copyright c 2016 SERSC

5 Table 8. Comparison Matrix and Test Results of the Second Level Evaluation Index Relative to the First Level Emergency Layer Indexes P4 first level evaluation index layerp 4 second level evaluation index response P 41 measurep 42 recovery response P /6 1/ measurep recovery P / P 43 maximum weight eigenvalue consistency ratio As CR is smaller than 0.10, P, P1, P2, P3, P4all pass the consistency test. The index weight of computer system security of banks is concluded as in Table 9. Table 9. The Index Weight of Computer System Security of Banks first level evaluation index weight second level evaluation index weight computer hardware P 11 ; physical layerp computer network facilitiesp 12 ; wiring system P 13 ; bank staff P 14 ; firewall P 21 ; vulnerability detection P 22 ; network layerp alarm system P 23 ; safety system P 24 ; certificate validation P 25 ; data detection P 31 ; data transmission P 32 ; data layerp data backup P 33 ; identity recognition P 34 ; log auditing P 35 ; response P 41 ; layerp measurep 42 ; recovery P 43 ; Risk Assessment Model for Computer System Security of Banks Risks of computer system security of banks are categorized into five levels: very safe, relatively safe, neutral, relatively dangerous and very dangerous. Establish risk assessment model for computer system security of banks. Establishing the risk assessment set The risk assessment set is shown in Table 10. Table 10. Risk Assessment Set for Computer System Security of Banks second level evaluation index computer hardware P 11 ; Security level Copyright c 2016 SERSC 5

6 computer network facilitiesp 12 ; wiring system P 13 ; bank staff P 14 ; firewall P 21 ; vulnerability detection P 22 ; alarm system P 23 ; safety system P 24 ; certificate validation P 25 ; data detection P 31 ; data transmission P 32 ; data backup P 33 ; identity recognition P 34 ; log auditing P 35 ; response P 41 ; measurep 42 ; recovery P 43 ; (2) Confirm the fuzzy evaluation judgment Expert judgment method is employed to confirm the judgment matrix. Suppose the judgment result of the i-thsecond level evaluation index in the first level evaluation (1) (1) (1) (1) (1) indexp1is ri 1 ri 2 ri 3 ri 4 r i5, where i 1,2,3,. 4 The fuzzy evaluation judgment of second level evaluation index is: 6 Copyright c 2016 SERSC

7 R r r r r r (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) r21 r22 r23 r24 r25 1 (1) (1) (1) (1) (1) r31 r32 r33 r34 r35 (1) (1) (1) (1) (1) r41 r42 r43 r44 r45 Where r ij the number of experts who rate j-class/ total number of experts. Similarly: r r r r r (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) r21 r22 r23 r24 r25 (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) r41 r42 r43 r44 r45 (2) (2) (2) (2) (2) r51 r52 r53 r54 r55 R r r r r r r r r r r r r r r r R r r r r r r r r r r r r r r r R (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) r r r r r r r r r r r r r r r (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) According to the weight of second level evaluation index, compute the fuzzy evaluation judgment of the first level evaluation index: R r T 1 R T T T 1 r2 R2 r3 R3 r4 R 4, Then, according to the weight of the first level evaluation index, compute the risk assessment vector of the computer system security of banks: T w r R According to the maximum principle, the highest risk is the class in which the computer network is categorized. 5. Model Application-Risk Assessment of a Certain Computer System Security of Banks A state-owned bank was subject to risk assessment. A team of 20 experts was asked to score 17 second level evaluation indexes of the computer system security. The judgment results are shown in Table 11.,,, Table 11. Expert Assessment of a Computer System Security of a Domestic Bank second level evaluation index. Assessment result computer hardware P 11 ; computer network facilitiesp 12 ; wiring system P 13 ; Copyright c 2016 SERSC 7

8 bank staff P 14 ; firewall P 21 ; vulnerability detection P 22 ; alarm system P 23 ; safety system P 24 ; certificate validation P 25 ; data detection P 31 ; data transmission P 32 ; data backup P 33 ; identity recognition P 34 ; log auditing P 35 ; response P 41 ; measurep 42 ; recovery P 43 ; Subject the results to data processing, as shown in Table 12. Table 12. Assessment Results after Data Processing second level evaluation index Assessment results after data processing computer hardware P 11 ; computer network facilitiesp 12 ; wiring system P 13 ; bank staff P 14 ; firewall P 21 ; vulnerability detection P 22 ; alarm system P 23 ; safety system P 24 ; certificate validation P 25 ; data detection P 31 ; data transmission P 32 ; data backup P 33 ; identity recognition P 34 ; log auditing P 35 ; response P 41 ; Copyright c 2016 SERSC

9 measurep 42 ; recovery P 43 ; Use MATLB (in the Appendix) to compute the judgment vector of risk assessment of the computer system security of banks: w According to the maximum principle, it is found that the computer system security of banks is very safe. Conclusion In response to the media report of loops holes in bank s system and to the credit crisis of banks, banks should enhance security management of its computer system and increase the safety level. Priority should be given to risk assessment of computer system security, so as to ensure a normal operation of bank s business. Appendix: MATLB program a=load ('yhjsjwlaq.txt'); w= [ ]; w1= [0.0736, , , ]; w2= [0.1815, , , , ]; w3= [0.4901, , , , ]; w4= [0.0915, , ]; b (1,:)=w1*a([1:4],:); b (2,:)=w2*a([5:9],:); b (3,:)=w3*a([10:14],:); b (4,:)=w4*a([15:end],:); c=w*b c = References [1] M. Ali Aydın, A. Halim Zaim, K. Gökhan Ceylan. A hybrid intrusion detection system design for computer network security [J]. Computers and Electrical Engineering, vol.35, no. 3, (2009), pp [2] J M. Estévez-Tapiador, ı -Teodoro,. ı z-verdejo. NSDF: a computer network system description framework and its application to network security [J]. Computer Networks, vol.43, no. 5, (2003), pp [3] S Zhang. A model for evaluating computer network security systems with 2-tuple linguistic information [J]. Computers and Mathematics with Applications, vol.62, no. 4, (2011), pp [4] R Lübben, M Fidler, J Liebeherr, Stochastic bandwidth estimation in networks with random service [J], IEEE/ACM Transactions on Networking (TON), vol.22, no. 2, (2014), pp [5] T J. Rothwell. Job applications and network security, or, how to not limit the online applicant pool [J]. Ubiquity, (2003) (April), pp.2-2. Copyright c 2016 SERSC 9

10 [6] G B. White, E A. Fisch, U W. Pooch. Computer System and Network Security. EDPACS, vol.25, no. 8, (1998). [7] G Gercek, N Saleem, Securing Small Business Computer Networks: An Examination of Primary Security Threats and Their Solutions, Information Security Journal: A Global Perspective, vol.14, no. 3, (2005). [8] Y-K Lin, C-L Pan. Considering retransmission mechanism and latency for network reliability evaluation in a stochastic computer network [J]. Journal of Industrial and Production Engineering, vol.31, no. 6, (2014), pp [9] L T o, Application of Fuzzy Mathematics in the Evaluation of Customer Satisfaction in Supermarket [ ], Journal of Capital Normal University, no. 3, (2015), pp [10] L Tao, Fuzzy Mathematics Evaluation based on University Network Risks [J]. Journal of Huaiyin Teachers College (Natural Science Edition), no. 2, (2015), pp [11] W ie, Analysis of Computer Network Security [J]. Guangxi Journal of Light Industry, no. 2, (2011), pp [12] X Zhe, On the Existing Problems and Countermeasures of the University Network Security [D]. (2012). [13] L Bingqi, The Factors Inlfuencing the Computer Network Security and Countermeasures [J]. Computer Engineering & Software, no. 3, (2014), pp [14] H Zhonggeng. Mathematical Modeling Methods and Application [M]. Beijing: Higher Education Press,( 2005). [15] S Jingwei, W Xinyi. Application of Comprehensive Evaluation for the Quality of the Physical and Chemical Laboratory by Fuzzy Mathematics [J]. Shanghai Journal of Preventive Medicine, vol. 6, no. 14, (2002), pp [16] Z Lijuan, W Qingxi n, Application of Fuzzy Analytic Hierarchy Process Model in Network Security Situation Assessment [J]. Computer Simulation, no. 12, (2011), pp [17] L T o, The Environment Impact Evaluation based on Urban Land Planning Project[J]. International Journal of Earth Sciences and Engineering, no. 2, (2015). 10 Copyright c 2016 SERSC

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances Proceedings of the 8th WSEAS International Conference on Fuzzy Systems, Vancouver, British Columbia, Canada, June 19-21, 2007 126 An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy

More information

Research on supply chain risk evaluation based on the core enterprise-take the pharmaceutical industry for example

Research on supply chain risk evaluation based on the core enterprise-take the pharmaceutical industry for example Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):593-598 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on supply chain risk evaluation based on

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39. Research Article. Analysis of results of CET 4 & CET 6 Based on AHP

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39. Research Article. Analysis of results of CET 4 & CET 6 Based on AHP Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Analysis of results of CET 4 & CET 6 Based on AHP

More information

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course , pp.291-298 http://dx.doi.org/10.14257/ijmue.2015.10.9.30 The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course Xiaoyu Chen 1 and Lifang Qiao

More information

A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service

A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service Vol.8, No.3 (2014), pp.175-180 http://dx.doi.org/10.14257/ijsh.2014.8.3.16 A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service Hong-Kyu Kwon 1 and Kwang-Kyu Seo 2* 1 Department

More information

A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain

A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain International Journal of Security and Its Applications, pp.81-88 http://dx.doi.org/10.1257/ijsia.201.8.6.08 A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain Xin

More information

Modern Accounting Information System Security (AISS) Research Based on IT Technology

Modern Accounting Information System Security (AISS) Research Based on IT Technology , pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and

More information

MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process

MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process Business Intelligence and Decision Making Professor Jason Chen The analytical hierarchy process (AHP) is a systematic procedure

More information

Research on e-commerce Security based on Risk Management Perspective

Research on e-commerce Security based on Risk Management Perspective , pp. 153-162 http://dx.doi.org/10.14257/ijsia.2014.8.3.17 Research on e-commerce Security based on Risk Management Perspective Wu Yanyan School of Computer and Information Engineering Harbin University

More information

The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method

The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method School of Management Shanghai University, Shanghai Baoshan 200072 School of Foreign Yiwu Industrial & Commercial

More information

Modeling and Performance Evaluation of Computer Systems Security Operation 1

Modeling and Performance Evaluation of Computer Systems Security Operation 1 Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system

More information

Fuzzy Comprehensive Evaluation Enterprise Performance Management

Fuzzy Comprehensive Evaluation Enterprise Performance Management Fuzzy Comprehensive Enterprise Performance Management Model Based on AHP Hunan Vocational College of Railway echnology,yuanjie2013@yeah.net, Zhuzhou, Hunan province, China Abstract Performance management

More information

Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone

Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone Offer Highly Available SAAS Solutions with Huawei Huang Li Executive Vice President of isoftstone Contents Contents 1 2 3 4 5 6 7 Significance of SMEs in Urban Development SME Status Quo IT Capabilities

More information

Construction of Early Risk Alarm Index System for Commercial Banks

Construction of Early Risk Alarm Index System for Commercial Banks DOI: 10.7763/IPEDR. 2012. V49. 23 Construction of Early Risk Alarm Index System for Commercial Banks Zheng Tian 1 and Zhang Li 2 1 Academic Adminstration Hangzhou Wangxiang Polytechnic,Hangzhou, P.R.China

More information

Adopting an Analytic Hierarchy Process to Select Internet Advertising Networks

Adopting an Analytic Hierarchy Process to Select Internet Advertising Networks Adopting an Analytic Hierarchy Process to Select Internet Advertising Networks Chin-Tasi Lin 1), Pi-Fang Hsu 2) 1) Yuanpei Institute of Science and Technology, Department of Information Management, Taiwan

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Research on Capability Assessment of IS Outsourcing Service Providers

Research on Capability Assessment of IS Outsourcing Service Providers , pp.291-298 http://dx.doi.org/10.14257/ijunesst.2015.8.6.28 Research on Capability Assessment of IS Outsourcing Service Providers Xinjun Li and Junyan Wang School of Economic and Management, Yantai University,

More information

Chinese Automobile Brand International Marketing Target Market Selection Model Based on AHP

Chinese Automobile Brand International Marketing Target Market Selection Model Based on AHP Chinese Automobile Brand International Marketing Target Market Selection Model Based on AHP Xiaoming-Tao School of Management Shanghai University of Engineering Science Shanghai, China Yubin-Qian Shanghai

More information

A solution for comprehensive network security

A solution for comprehensive network security Applied mathematics in Engineering, Management and Technology 2 (6) 2014:22-26 www.amiemt-journal.com A solution for comprehensive network security Seyed Mehdi Mousavi Payam Noor University (PNU), IRAN

More information

Project Management Software Selection Using Analytic Hierarchy Process Method

Project Management Software Selection Using Analytic Hierarchy Process Method International Journal of Applied Science and Technology Vol. 4, No. ; November 04 Project Management Software Selection Using Analytic Hierarchy Process Method Birgul Kutlu Professor Bogazici University

More information

Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information

Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information Journal of Computational Information Systems 9: 14 2013 5529 5534 Available at http://www.jofcis.com Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic

More information

Project Management Software Selection Using Analytic Hierarchy Process Method

Project Management Software Selection Using Analytic Hierarchy Process Method Project Management Software Selection Using Analytic Hierarchy Process Method ISSN - 35-055 Sweety Sen (B.tech: Information Technology) Dronacharya College of Engineering Gurgaon, India Phone no. : 00343

More information

Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model

Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model 1, 2 1 International School of Software, Wuhan University, Wuhan, China *2 School of Information

More information

ANALYTIC HIERARCHY PROCESS (AHP) TUTORIAL

ANALYTIC HIERARCHY PROCESS (AHP) TUTORIAL Kardi Teknomo ANALYTIC HIERARCHY PROCESS (AHP) TUTORIAL Revoledu.com Table of Contents Analytic Hierarchy Process (AHP) Tutorial... 1 Multi Criteria Decision Making... 1 Cross Tabulation... 2 Evaluation

More information

The Analytic Hierarchy Process. Danny Hahn

The Analytic Hierarchy Process. Danny Hahn The Analytic Hierarchy Process Danny Hahn The Analytic Hierarchy Process (AHP) A Decision Support Tool developed in the 1970s by Thomas L. Saaty, an American mathematician, currently University Chair,

More information

Cloud Security - Characteristics, Advantages and Disadvantages

Cloud Security - Characteristics, Advantages and Disadvantages The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,

More information

Network Security Evaluation Mould based on Multifactor Fuzzy

Network Security Evaluation Mould based on Multifactor Fuzzy Network Security Evaluation Mould based on Multifactor Fuzzy Evaluation 1 Tao Wu, 2 Jun Ma, 3 Hang Zhang 1, Network Information Center, Hebei United University, Tangshan, China, happynat@163.com 2, Network

More information

An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems

An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng

More information

Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability

Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability Yuan Chunyang National Computer network

More information

Study on Remote Access for Library Based on SSL VPN

Study on Remote Access for Library Based on SSL VPN , pp.111-122 http://dx.doi.org/10.14257/ijca.2016.9.1.11 Study on Remote Access for Library Based on SSL VPN Mei Zhang Library, Linyi University, Shandong, 276000, China zhangmei7596@163.com Abstract With

More information

How To Perform An External Security Vulnerability Assessment Of An External Computer System

How To Perform An External Security Vulnerability Assessment Of An External Computer System External Vulnerability Assessment -Executive Summary- Prepared for: ABC ORGANIZATION On March 9, 2008 Prepared by: AOS Security Solutions 1 of 5 Table of Contents Executive Summary... 3 Immediate Focus

More information

Fault Analysis in Software with the Data Interaction of Classes

Fault Analysis in Software with the Data Interaction of Classes , pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Comparative Analysis of FAHP and FTOPSIS Method for Evaluation of Different Domains

Comparative Analysis of FAHP and FTOPSIS Method for Evaluation of Different Domains International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) August 2015, PP 58-62 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Comparative Analysis of

More information

How to do AHP analysis in Excel

How to do AHP analysis in Excel How to do AHP analysis in Excel Khwanruthai BUNRUAMKAEW (D) Division of Spatial Information Science Graduate School of Life and Environmental Sciences University of Tsukuba ( March 1 st, 01) The Analytical

More information

The Television Shopping Service Model Based on HD Interactive TV Platform

The Television Shopping Service Model Based on HD Interactive TV Platform , pp. 195-204 http://dx.doi.org/10.14257/ijunesst.2014.7.6.17 The Television Shopping Service Model Based on HD Interactive TV Platform Mengke Yang a and Jianqiu Zeng b Beijing University of Posts and

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Comprehensive colliery safety monitoring system

More information

Study of the Decision-Making Model of Outsourcing Service Provider Selection

Study of the Decision-Making Model of Outsourcing Service Provider Selection Study of the Decision-Making Model of Outsourcing Service Provider Selection En-lin Li Post-doctoral Research Working Station of North-east Asia Outsourcing Research Center, Harbin University of Commerce,

More information

A Research on Security Awareness and Countermeasures for the Single Server

A Research on Security Awareness and Countermeasures for the Single Server , pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business

More information

OPERATIONAL RISK EFFECT ON INSURANCE MARKET S ACTIVITY Darja Stepchenko, Irina Voronova, Gaida Pettere Riga Technical University, Latvia

OPERATIONAL RISK EFFECT ON INSURANCE MARKET S ACTIVITY Darja Stepchenko, Irina Voronova, Gaida Pettere Riga Technical University, Latvia OPERATIONAL RISK EFFECT ON INSURANCE MARKET S ACTIVITY Darja Stepchenko, Irina Voronova, Gaida Pettere Riga Technical University, Latvia Abstract. The main aim of Solvency II framework is to establish

More information

1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014

1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 Combining various trust factors for e-commerce platforms using Analytic Hierarchy Process Bo Li a, Yu Zhang b,, Haoxue Wang c, Haixia Xia d, Yanfei Liu

More information

On Video Content Delivery in Wireless Environments

On Video Content Delivery in Wireless Environments , pp.81-85 http://dx.doi.org/10.14257/astl.2014.65.20 On Video Content Delivery in Wireless Environments Po-Jen Chuang and Hang-Li Chen Department of Electrical Engineering Tamkang University Tamsui, New

More information

Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process

Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process Y. H. Liang Department of Information Management, I-SHOU

More information

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion

More information

Supplier Performance Evaluation and Selection in the Herbal Industry

Supplier Performance Evaluation and Selection in the Herbal Industry Supplier Performance Evaluation and Selection in the Herbal Industry Rashmi Kulshrestha Research Scholar Ranbaxy Research Laboratories Ltd. Gurgaon (Haryana), India E-mail : rashmi.kulshreshtha@ranbaxy.com

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

THE ANALYTIC HIERARCHY PROCESS (AHP)

THE ANALYTIC HIERARCHY PROCESS (AHP) THE ANALYTIC HIERARCHY PROCESS (AHP) INTRODUCTION The Analytic Hierarchy Process (AHP) is due to Saaty (1980) and is often referred to, eponymously, as the Saaty method. It is popular and widely used,

More information

Crime Hotspots Analysis in South Korea: A User-Oriented Approach

Crime Hotspots Analysis in South Korea: A User-Oriented Approach , pp.81-85 http://dx.doi.org/10.14257/astl.2014.52.14 Crime Hotspots Analysis in South Korea: A User-Oriented Approach Aziz Nasridinov 1 and Young-Ho Park 2 * 1 School of Computer Engineering, Dongguk

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

USING THE ANALYTIC HIERARCHY PROCESS FOR DECISION MAKING IN ENGINEERING APPLICATIONS: SOME CHALLENGES

USING THE ANALYTIC HIERARCHY PROCESS FOR DECISION MAKING IN ENGINEERING APPLICATIONS: SOME CHALLENGES Published in: Inter l Journal of Industrial Engineering: Applications and Practice, Vol. 2, No. 1, pp. 35-44, 1995. 1 USING THE ANALYTIC HIERARCHY PROCESS FOR DECISION MAKING IN ENGINEERING APPLICATIONS:

More information

CHAPTER 3 IDENTIFICATION OF MOST PREFERRED KEY PERFORMANCE INDICATOR IN INDIAN CALL CENTRES

CHAPTER 3 IDENTIFICATION OF MOST PREFERRED KEY PERFORMANCE INDICATOR IN INDIAN CALL CENTRES 49 CHAPTER 3 IDENTIFICATION OF MOST PREFERRED KEY PERFORMANCE INDICATOR IN INDIAN CALL CENTRES 3.1 INTRODUCTION Key Performance Indicators (KPIs) is means for assessment of an organisations current position

More information

Research of Female Consumer Behavior in Cosmetics Market Case Study of Female Consumers in Hsinchu Area Taiwan

Research of Female Consumer Behavior in Cosmetics Market Case Study of Female Consumers in Hsinchu Area Taiwan usiness, 2010, 2, 348-353 doi:10.4236/ib.2010.24045 Published Online December 2010 (http://www.scirp.org/journal/ib) Research of Female Consumer Behavior in Cosmetics Market Case Study of Female Consumers

More information

Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks

Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks Enrique Stevens-Navarro and Vincent W.S. Wong Department of Electrical and Computer Engineering The University

More information

Estimation of Unknown Comparisons in Incomplete AHP and It s Compensation

Estimation of Unknown Comparisons in Incomplete AHP and It s Compensation Estimation of Unknown Comparisons in Incomplete AHP and It s Compensation ISSN 0386-1678 Report of the Research Institute of Industrial Technology, Nihon University Number 77, 2005 Estimation of Unknown

More information

Analytic Hierarchy Process-based Social Public Sports Facility Utilization and Development Research

Analytic Hierarchy Process-based Social Public Sports Facility Utilization and Development Research Send Orders for Reprints to reprints@benthamscience.ae The Open ybernetics & Systemics Journal, 0, 9, - Open Access Analytic Hierarchy Process-based Social Public Sports Facility Utilization and Development

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

Evaluate the Usability of Security Audits in Electronic Commerce

Evaluate the Usability of Security Audits in Electronic Commerce Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka

More information

Best Practices For Department Server and Enterprise System Checklist

Best Practices For Department Server and Enterprise System Checklist Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)

More information

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online

More information

Design of Electronic Medical Record System Based on Cloud Computing Technology

Design of Electronic Medical Record System Based on Cloud Computing Technology TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based

More information

On-line Payment and Security of E-commerce

On-line Payment and Security of E-commerce ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,

More information

Research on the Influence of E-commerce Platform to Agricultural Logistics: An Empirical Analysis based on Agricultural Product Marketing

Research on the Influence of E-commerce Platform to Agricultural Logistics: An Empirical Analysis based on Agricultural Product Marketing , pp.287-296 http://dx.doi.org/10.14257/ijsia.2015.9.10.26 Research on the Influence of E-commerce Platform to Agricultural Logistics: An Empirical Analysis based on Agricultural Product Marketing Yuqiu

More information

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model

More information

Study of data structure and algorithm design teaching reform based on CDIO model

Study of data structure and algorithm design teaching reform based on CDIO model Study of data structure and algorithm design teaching reform based on CDIO model Li tongyan, Fu lin (Chengdu University of Information Technology, 610225, China) ABSTRACT CDIO is a new and innovative engineering

More information

Analysis on the Present Condition Differences between the Specialty- Education of Sino-American Construction Engineering Management

Analysis on the Present Condition Differences between the Specialty- Education of Sino-American Construction Engineering Management I.J. Education and Management Engineering 2012, 6, 56-60 Published Online July 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2012.06.10 Available online at http://www.mecs-press.net/ijeme

More information

The Application of AHP in Biotechnology Industry with ERP KSF Implementation

The Application of AHP in Biotechnology Industry with ERP KSF Implementation The Application of AHP in Biotechnology Industry with KSF Implementation Ming-Lang Wang 1, H. F. Lin 2, K. W. Wang 2 1 Department of Industrial Management, Chung Hua University, Hsinchu, Taiwan 2 Department

More information

Research on the Effect of E-Commerce Industrial Development on the Promotion of New Urbanization

Research on the Effect of E-Commerce Industrial Development on the Promotion of New Urbanization Vol. (UNESST 214), pp.54-5 http://dx.doi.org/1.1425/astl.214..11 Research on the Effect of E-Commerce Industrial Development on the Promotion of New Urbanization Li Jia li, Cheng Tao Harbin University

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

Toward Secure Distribution of Electronic Health Records: Quantitative feasibility study on secure E-mail systems for sharing patient records

Toward Secure Distribution of Electronic Health Records: Quantitative feasibility study on secure E-mail systems for sharing patient records J Med Dent Sci 2005; 52: 229 236 Original Article Toward Secure Distribution of Electronic Health Records: Quantitative feasibility study on secure E-mail systems for sharing patient records Yuichiro Gomi

More information

Design of Hospital EMR Management System

Design of Hospital EMR Management System International Journal of u-and e-service, Science and Technology, pp.341-348 http://dx.doi.org/10.14257/ijunnesst.2014.7.5.30 Design of Hospital EMR Management System Hongfeng He and Yixin Yan * Harbin

More information

Credit Risk Comprehensive Evaluation Method for Online Trading

Credit Risk Comprehensive Evaluation Method for Online Trading Credit Risk Comprehensive Evaluation Method for Online Trading Company 1 *1, Corresponding Author School of Economics and Management, Beijing Forestry University, fankun@bjfu.edu.cn Abstract A new comprehensive

More information

A Study on the Development of Next Generation Intelligent Integrated Security Management Model using Big Data Technology

A Study on the Development of Next Generation Intelligent Integrated Security Management Model using Big Data Technology , pp. 217-226 http://dx.doi.org/10.14257/ijsia.2015.9.6.21 A Study on the Development of Next Generation Intelligent Integrated Security Management Model using Big Data Technology JeongBeom Kim Professor,

More information

Maruleng Local Municipality

Maruleng Local Municipality Maruleng Local Municipality. 22 November 2011 1 Version Control Version Date Author(s) Details 1.1 23/03/2012 Masilo Modiba New Policy 2 Contents ICT Firewall Policy 1 Version Control.2 1. Introduction.....4

More information

Study of Lightning Damage Risk Assessment Method for Power Grid

Study of Lightning Damage Risk Assessment Method for Power Grid Energy and Power Engineering, 2013, 5, 1478-1483 doi:10.4236/epe.2013.54b280 Published Online July 2013 (http://www.scirp.org/journal/epe) Study of Lightning Damage Risk Assessment Method for Power Grid

More information

Design and Implementation of the Self-Management Travel System

Design and Implementation of the Self-Management Travel System Design and Implementation of the Self-Management Travel System Dongbei University of Finance and Economics School of Tourism and Hotel Management,Dalian, China 116025 Abstract Through skeleton system,

More information

The Research of Data Management in the University Human Resource Systems

The Research of Data Management in the University Human Resource Systems , pp.61-65 http://dx.doi.org/10.14257/astl.2014.53.15 The Research of Data in the University Human Resource Systems Ye FAN, Shaoyun GUAN, Honglue LV Harbin University of Commerce gsyj91@163.com Abstract.

More information

High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture

High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture , pp. 127-136 http://dx.doi.org/10.14257/ijfgcn.2015.8.1.14 High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture Gengxin Sun and Sheng Bin International College

More information

A Multi-attribute Decision Making Approach for Resource Allocation in Software Projects

A Multi-attribute Decision Making Approach for Resource Allocation in Software Projects A Multi-attribute Decision Making Approach for Resource Allocation in Software Projects A. Ejnioui, C. E. Otero, and L. D. Otero 2 Information Technology, University of South Florida Lakeland, Lakeland,

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

Research on the Comprehensive Evaluation of Business Intelligence System Based on BP Neural Network

Research on the Comprehensive Evaluation of Business Intelligence System Based on BP Neural Network Available online at www.sciencedirect.com Systems Engineering Procedia 00 (2011) 000 000 Systems Engineering Procedia 4 (2012) 275 281 Systems Engineering Procedia www.elsevier.com/locate/procedia 2 nd

More information

Application of the Multi Criteria Decision Making Methods for Project Selection

Application of the Multi Criteria Decision Making Methods for Project Selection Universal Journal of Management 3(1): 15-20, 2015 DOI: 10.13189/ujm.2015.030103 http://www.hrpub.org Application of the Multi Criteria Decision Making Methods for Project Selection Prapawan Pangsri Faculty

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

Research on the Course of Network Performance Testing and Analysis

Research on the Course of Network Performance Testing and Analysis 2012 International Conference on Education Technology and Computer (ICETC2012) IPCSIT vol.43 (2012) (2012) IACSIT Press, Singapore Research on the Course of Network Performance Testing and Analysis Xiurong

More information

Research on the Facilitation of E-commerce Technology Development on New-type Urbanization Construction in the Internet of Things Era

Research on the Facilitation of E-commerce Technology Development on New-type Urbanization Construction in the Internet of Things Era , pp.23-238 http://dx.doi.org/.4257/ijunesst.25.8.3.22 Research on the Facilitation of E-commerce Technology Development on New-type Urbanization Construction in the Internet of Things Era Li Jia li and

More information

Fexible QoS Management of Web Services Orchestrations

Fexible QoS Management of Web Services Orchestrations Fexible QoS Management of Web Services Orchestrations Ajay Kattepur 1 1 Equipe ARLES, INRIA Paris-Rocquencourt, France. Collaborators: Albert Benveniste (INRIA), Claude Jard (INRIA / Uni. Nantes), Sidney

More information

Construction of Information Disaster Recovery for Hospitals

Construction of Information Disaster Recovery for Hospitals 148 Construction of Information Disaster Recovery for Hospitals Juan Xu School of Information, Yunnan University of Finance and Economics, Yunnan 650221, China E-mail: Xujuan@ynufe.edu.cn Abstract When

More information

How To Study The Effects Of A Customer Relationship Management

How To Study The Effects Of A Customer Relationship Management International Review of Management and Marketing Vol. 4, No. 2, 2014, pp.167-174 ISSN: 2146-4405 www.econjournals.com Comparison of CRM Programs Basing on Improving Customer Profitability: Using the AHP

More information

Vendor Evaluation and Rating Using Analytical Hierarchy Process

Vendor Evaluation and Rating Using Analytical Hierarchy Process Vendor Evaluation and Rating Using Analytical Hierarchy Process Kurian John, Vinod Yeldho Baby, Georgekutty S.Mangalathu Abstract -Vendor evaluation is a system for recording and ranking the performance

More information

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...

More information

Decision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process

Decision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process Decision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process Nina Begičević University of Zagreb, Faculty of Organization and Informatics, Pavlinska 2, Varaždin nina.begicevic@foi.hr

More information

USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORITIZE PROJECTS IN A PORTFOLIO

USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORITIZE PROJECTS IN A PORTFOLIO USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORIZE PROJECTS IN A PORTFOLIO Ricardo Viana Vargas, MSc, IPMA-B, PMP Professor Fundação Getúlio Vargas (FGV) Brasil Professor Fundação Instituto

More information

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration Module 1: Overview This module provides an overview of the AlienVault Unified Security Management (USM) solution. Upon completing this module, you will meet these objectives: Describe the goal of network

More information

Analysis of Regression Based on Sampling Weights in Complex Sample Survey: Data from the Korea Youth Risk Behavior Web- Based Survey

Analysis of Regression Based on Sampling Weights in Complex Sample Survey: Data from the Korea Youth Risk Behavior Web- Based Survey , pp.65-74 http://dx.doi.org/10.14257/ijunesst.2015.8.10.07 Analysis of Regression Based on Sampling Weights in Complex Sample Survey: Data from the Korea Youth Risk Behavior Web- Based Survey Haewon Byeon

More information

The Analytic Network Process

The Analytic Network Process The Analytic Network Process Thomas L. Saaty University of Pittsburgh saaty@katz.pitt.edu Abstract The Analytic Network Process (ANP) is a generalization of the Analytic Hierarchy Process (AHP). The basic

More information

Online Marketing Strategy for Agricultural Supply Chain and Regional Economic Growth based on E-commerce Perspective

Online Marketing Strategy for Agricultural Supply Chain and Regional Economic Growth based on E-commerce Perspective , pp.323-332 http://dx.doi.org/10.14257/ijsia.2015.9.10.29 Online Marketing Strategy for Agricultural Supply Chain and Regional Economic Growth based on E-commerce Perspective Hui Yang and Yajuan Zhang*

More information

E-business Management System Based on Coordinated Center for Dealer

E-business Management System Based on Coordinated Center for Dealer The Fourth International Conference on Electronic Business (ICEB2004) / Beijing 533 E-business Based on Coordinated Center for Dealer Ding Zhang 1, Jingwen An 1, Zhongqing Cheng 2 1 School of Management,

More information

Development of an Enhanced Web-based Automatic Customer Service System

Development of an Enhanced Web-based Automatic Customer Service System Development of an Enhanced Web-based Automatic Customer Service System Ji-Wei Wu, Chih-Chang Chang Wei and Judy C.R. Tseng Department of Computer Science and Information Engineering Chung Hua University

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information